Δωρεές 15 Σεπτεμβρίου 2024 – 1 Οκτωβρίου 2024 Σχετικά με συγκέντρωση χρημάτων
1
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Έτος:
2012
Γλώσσα:
english
Αρχείο:
PDF, 7.83 MB
5.0 / 4.5
english, 2012
2
Practical Lock Picking - A Physical Penetration Tester's Training Guide

Practical Lock Picking - A Physical Penetration Tester's Training Guide

Έτος:
2010
Γλώσσα:
english
Αρχείο:
PDF, 19.19 MB
0 / 0
english, 2010
3
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Έτος:
2011
Γλώσσα:
english
Αρχείο:
PDF, 3.74 MB
1.0 / 5.0
english, 2011
4
Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems

Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems

Έτος:
2017
Γλώσσα:
english
Αρχείο:
PDF, 13.58 MB
0 / 0
english, 2017
5
Buffer Overflow Attacks: Detect, Exploit, Prevent

Buffer Overflow Attacks: Detect, Exploit, Prevent

Έτος:
2005
Γλώσσα:
english
Αρχείο:
PDF, 5.38 MB
5.0 / 5.0
english, 2005
6
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 7.20 MB
4.0 / 5.0
english, 2007
7
Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 9.18 MB
0 / 0
english, 2007
8
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing

No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing

Έτος:
2008
Γλώσσα:
english
Αρχείο:
PDF, 21.50 MB
0 / 0
english, 2008
9
Reverse Engineering Code with IDA Pro

Reverse Engineering Code with IDA Pro

Έτος:
2008
Γλώσσα:
english
Αρχείο:
PDF, 3.91 MB
5.0 / 5.0
english, 2008
10
SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

Έτος:
2009
Γλώσσα:
english
Αρχείο:
PDF, 3.34 MB
5.0 / 5.0
english, 2009
11
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

Έτος:
2013
Γλώσσα:
english
Αρχείο:
PDF, 25.24 MB
0 / 0
english, 2013
12
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Έτος:
2012
Γλώσσα:
english
Αρχείο:
PDF, 14.68 MB
5.0 / 5.0
english, 2012
13
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Έτος:
2014
Γλώσσα:
english
Αρχείο:
PDF, 18.63 MB
4.0 / 2.0
english, 2014
14
Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security: Exploiting Hardware and Software

Έτος:
2005
Γλώσσα:
english
Αρχείο:
PDF, 78.40 MB
0 / 0
english, 2005
15
DNS Security. Defending the Domain Name System

DNS Security. Defending the Domain Name System

Έτος:
2016
Γλώσσα:
english
Αρχείο:
PDF, 5.80 MB
0 / 0
english, 2016
16
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Έτος:
2010
Γλώσσα:
english
Αρχείο:
PDF, 12.87 MB
5.0 / 5.0
english, 2010
17
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 7.19 MB
0 / 0
english, 2007
18
Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense

Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense

Έτος:
2014
Γλώσσα:
english
Αρχείο:
PDF, 15.11 MB
0 / 0
english, 2014
19
Research Methods for Cyber Security

Research Methods for Cyber Security

Έτος:
2017
Γλώσσα:
english
Αρχείο:
PDF, 10.28 MB
0 / 0
english, 2017
20
Cryptography for Developers

Cryptography for Developers

Έτος:
2006
Γλώσσα:
english
Αρχείο:
PDF, 4.10 MB
0 / 0
english, 2006
21
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Έτος:
2014
Γλώσσα:
english
Αρχείο:
PDF, 5.51 MB
0 / 5.0
english, 2014
22
IP addressing and subnetting, including IPv6

IP addressing and subnetting, including IPv6

Έτος:
1999
Γλώσσα:
english
Αρχείο:
PDF, 1.73 MB
5.0 / 3.5
english, 1999
23
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Έτος:
2014
Γλώσσα:
english
Αρχείο:
PDF, 6.87 MB
5.0 / 5.0
english, 2014
24
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 13.67 MB
0 / 0
english, 2007
25
Sockets, Shellcode, Porting, & Coding. Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, & Coding. Reverse Engineering Exploits and Tool Coding for Security Professionals

Έτος:
2005
Γλώσσα:
english
Αρχείο:
PDF, 23.29 MB
0 / 0
english, 2005
26
Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Έτος:
2004
Γλώσσα:
english
Αρχείο:
PDF, 22.75 MB
0 / 0
english, 2004
27
Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Έτος:
2011
Γλώσσα:
english
Αρχείο:
PDF, 39.01 MB
0 / 4.0
english, 2011
28
How to Define and Build an Effective Cyber Threat Intelligence Capability

How to Define and Build an Effective Cyber Threat Intelligence Capability

Έτος:
2014
Γλώσσα:
english
Αρχείο:
PDF, 3.33 MB
4.0 / 4.0
english, 2014
29
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

Έτος:
2012
Γλώσσα:
english
Αρχείο:
PDF, 7.39 MB
0 / 0
english, 2012
30
Logging and log management: The authoritative guide to understanding the concepts surrounding logging and log management

Logging and log management: The authoritative guide to understanding the concepts surrounding logging and log management

Έτος:
2012
Γλώσσα:
english
Αρχείο:
PDF, 11.84 MB
5.0 / 0
english, 2012
31
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Έτος:
2010
Γλώσσα:
english
Αρχείο:
PDF, 9.85 MB
0 / 0
english, 2010
32
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

Έτος:
2012
Γλώσσα:
english
Αρχείο:
PDF, 7.92 MB
0 / 0
english, 2012
33
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Έτος:
2011
Γλώσσα:
english
Αρχείο:
PDF, 6.31 MB
4.0 / 4.0
english, 2011
34
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management

Έτος:
2010
Γλώσσα:
english
Αρχείο:
PDF, 6.15 MB
0 / 0
english, 2010
35
Essential Skills for Hackers

Essential Skills for Hackers

Έτος:
2016
Γλώσσα:
english
Αρχείο:
PDF, 6.09 MB
5.0 / 3.0
english, 2016
36
Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments

Έτος:
2010
Γλώσσα:
english
Αρχείο:
PDF, 5.56 MB
5.0 / 5.0
english, 2010
37
10 Cool LEGO Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour

10 Cool LEGO Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour

Έτος:
2002
Γλώσσα:
english
Αρχείο:
PDF, 31.51 MB
0 / 0
english, 2002
38
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Έτος:
2013
Γλώσσα:
english
Αρχείο:
PDF, 6.57 MB
0 / 5.0
english, 2013
39
Google Hacking for Penetration Testers, Volume 2

Google Hacking for Penetration Testers, Volume 2

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 15.27 MB
0 / 0
english, 2007
40
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

Έτος:
2016
Γλώσσα:
english
Αρχείο:
PDF, 29.64 MB
0 / 0
english, 2016
41
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 5.01 MB
0 / 0
english, 2007
42
Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

Έτος:
2016
Γλώσσα:
english
Αρχείο:
PDF, 30.45 MB
0 / 5.0
english, 2016
43
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 5.73 MB
0 / 0
english, 2007
44
Perfect Passwords: Selection, Protection, Authentication

Perfect Passwords: Selection, Protection, Authentication

Έτος:
2005
Γλώσσα:
english
Αρχείο:
PDF, 1.80 MB
0 / 0
english, 2005
45
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence

Έτος:
2013
Γλώσσα:
english
Αρχείο:
PDF, 165.70 MB
0 / 0
english, 2013
46
Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Έτος:
2016
Γλώσσα:
english
Αρχείο:
PDF, 2.03 MB
0 / 0
english, 2016
47
Hack Proofing Your Wireless Network

Hack Proofing Your Wireless Network

Έτος:
2002
Γλώσσα:
english
Αρχείο:
PDF, 5.94 MB
0 / 0
english, 2002
48
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Έτος:
2013
Γλώσσα:
english
Αρχείο:
PDF, 9.22 MB
4.0 / 4.5
english, 2013
49
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Έτος:
2008
Γλώσσα:
english
Αρχείο:
EPUB, 8.56 MB
0 / 0
english, 2008
50
Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Έτος:
2007
Γλώσσα:
english
Αρχείο:
PDF, 10.91 MB
0 / 0
english, 2007